Cybercrime

See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack

See Tickets is informing 300,000 individuals that their payment card information was stolen in a new web skimmer attack.

See Tickets is informing 300,000 individuals that their payment card information was stolen in a new web skimmer attack.

Ticketing services agency See Tickets has notified more than 300,000 individuals that their payment card data was stolen in a new web skimmer attack.

Owned by Vivendi SA, See Tickets provides ticketing services for a broad range of event types, including comedy, festival, lifestyle, and sport, and operates both regional and international websites in North America and Europe.

In a data breach notification letter sent to the affected individuals, a copy of which was submitted to the Maine Attorney General’s Office, See Tickets says the new attack was identified in May 2023 and completely shut down in July.

“In May 2023, See Tickets became aware of unusual activity on certain of its e-commerce websites,” the agency notes in the notification letter.

A forensics firm retained to investigate the hacker attack discovered that, in May and June 2023, an unauthorized third-party “inserted multiple instances of malicious code into a number of [See Tickets’] e-commerce checkout pages”, See Tickets explains.

Between February 28 and July 2, the malicious code – which is typically referred to as a web skimmer – collected and exfiltrated the information that users provided on those checkout pages, including their names, addresses, and payment card information.

The ticketing services agency also notes that it has no evidence to suggest that the stolen personal information was fraudulently used. However, such data is typically shared between cybercriminals and used to perform various types of fraud.

See Tickets claims to have implemented additional safeguards to protect payment card information on its web pages, but this is the second time in the past year that it warns users of a web skimmer on its websites.

Advertisement. Scroll to continue reading.

Disclosed in October 2022 and impacting names, addresses, and payment card data, the first skimmer attack was identified in April 2021 but only shut down in January 2022.

Related: See Tickets Customer Payment Card Data Stolen by Web Skimmer

Related: Website of Canadian Liquor Distributor LCBO Infected With Web Skimmer

Related: Hundreds of eCommerce Domains Infected With Google Tag Manager-Based Skimmers

Related Content

Data Breaches

The Ohio Lottery cyberattack conducted by the DragonForce ransomware group has impacted more than 500,000 individuals.

Cybercrime

Zscaler says its customer, production and corporate environments are not impacted after a notorious hacker offers to sell access.

Ransomware

Philadelphia-based real estate company Brandywine Realty Trust shuts down systems following a ransomware attack.

Data Breaches

University System of Georgia says Social Security numbers and bank account numbers were compromised in the May 2023 MOVEit hack.

Data Breaches

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

Data Breaches

Financial Business and Consumer Solutions (FBCS) says compromised information may include names, dates of birth, Social Security numbers, and account information.

Data Breaches

UnitedHealth confirms that personal and health information was stolen in a ransomware attack that could cost the company up to $1.6 billion.

Data Breaches

The LockBit ransomware gang leaks data allegedly stolen from government contractor Tyler Technologies.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version